The New Generation Of Cyber Security Threats

Employees working from home have become a tempting target for hackers. Cyber criminals are exploiting the chaos caused by the virus and the proportion of attacks targeting home workers increased from 12% of malicious email traffic before the lockdown began in March to more than 60% just six weeks later. 

Leading AI-driven cybers security firm Darktrace say they detected “a large malicious email campaign” against UK businesses that told employees they could choose to be furloughed if they signed up to a specific unnamed website.

The attacks have increased in sophistication, specifically targeting coronavirus-related anxieties rather than the more usual attempts at financial fraud or extortion. These threats typically aim to sidestep standard cyber security measures that many home workers now have in place, and that means that its necessary to take some extra steps to thwart them.

Phishing attacks, where hackers use misleading emails or fake web sites to trick people into clicking on malicious links or downloading malware onto their computers, have long been one of the most dangerous types of cyber-attacks. The best way to protect against phishing attacks is to be aware of the risks. That means that staff should be educated and reminded never to click on links in emails that they are not expecting, and never to download software from websites that they reach via a link in an email, especially if they purport to contain information about COVID-19.

Hackers understand that there are rich pickings to be had in the cloud, which explains a new type of threat which is emerging: Cloud-Intelligence (AI) technology is advancing at a very high rate, and one area that hackers are likely to use this in the future is in the production of "deepfake" voices which mimic the voice of a real person. 

Using deepfake voice technology, hackers could reproduce the voice of a charity leader, and then call a charity employee working from home. Using the deepfake voice the hacker could then tell the employee to transfer money to a bank account using some plausible pretext.

Reducing human error has as much of a role in cyber security as a faulty anti-malware system. Make sure you know what you can do within your role to protect your company from cyber-attacks and have cyber security training for all your employees. Proper training is a cost effective and usually results in spending less on cyber security because your workforce's activities are tightly aligned to the threats.

Keeping your company safe from cyber threats requires diligence and effective IT cybersecurity strategies.  Combining common sense with good practices can help avoid cyber attack attempts. 

Darktrace:   Cybersecurity Insiders:       Guardian:           CUNA Mutual:       Charity Digital

To reduce the negative effects of cyber hacking one very important part is to ensure your staff and management have effective cyber security training. Cyber Security Intelligence recommends GoCyber. For a free test trial please Click  > Here <

You Might Also Read:

Easing Out Of Lockdown

 

« US - China Conflict Over Social Media
Financial Fraud Using Fake Celebrity Endorsements »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

eScan AV

eScan AV

eScan develops Information Security solutions that provide protection against current and evolving cyber threats.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

SRI International

SRI International

SRI International is a research institute performing client-sponsored R&D in a broad range of study areas including computing and cybersecurity.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

u-blox

u-blox

u-blox deliver leading wireless technology to reliably and securely locate and connect people and devices.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

Selectron Systems

Selectron Systems

Selectron offers system solutions for automation in rail vehicles and support in dealing with your railway cyber security challenges.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Ultra Electronics

Ultra Electronics

Ultra specialises in providing application-engineered bespoke solutions. We focus on mission critical and intelligent systems in the defence, security, critical detection & control markets.

CyberAcuView

CyberAcuView

CyberAcuView is a company dedicated to enhancing cyber risk mitigation efforts across the insurance industry.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.